Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

SelectedWorks

Selected Works

2010

Discipline
Keyword
Publication

Articles 1 - 25 of 25

Full-Text Articles in Computer Engineering

Tuning Of Power System Stabilizers Using Particle Swarm Optimization With Passive Congregation, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, S. P Ghoshal Dec 2010

Tuning Of Power System Stabilizers Using Particle Swarm Optimization With Passive Congregation, Mahdiyeh Eslami, Hussain Shareef, Azah Mohamed, S. P Ghoshal

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Closing The Gap Between The Industry And Higher Education Institutions- Case Examples From East African Region, Deogratias Harorimana Mr Nov 2010

Closing The Gap Between The Industry And Higher Education Institutions- Case Examples From East African Region, Deogratias Harorimana Mr

Dr Deogratias Harorimana

Much complained about is the quality of graduates Universities put on the labour market. Less talked about however is why knowledge institutions seems to be bad knowledge managers. In this presentation I argue that DIRECT collaborative relationship between Industry,Governments and Higher Education Institutions is a per-requisite.Good relationship is key to building such a successful knowledge transfer strategies between Industries and Educational and Research Institutions. This paper explores what makes a good Knowledge Transfer Partnership Strategy and highlights some key lessons for businesses, Universities and Government bodies. This paper was a Key note presentation to the Annual International Conference on Building …


Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman Sep 2010

Public Consultations On Net Neutrality 2010: Usa, Eu And France, Sulan Wong, Julio Rojas Mora, Eitan Altman

Julio Rojas-Mora

The evolution of the Internet has come to a point where almost at the same time, governments all around the world feel the need for legislation to regulate the use of the Internet. In preparing the legislation, consultations were called by various governments or by the corresponding regulation bodies. We describe in this paper the various consultations as well as the background related to the Net Neutrality question in each case. Rather than describing the answers to each consultation, which are available and which have already been analyzed, we focus on comparing the consultations and the statistical figures related to …


The Role Of Knowledge Management In The Strategic Alignment Of Information Technology With Business: An Alternative And Complementary View, Fernando Paulo Belfo Sep 2010

The Role Of Knowledge Management In The Strategic Alignment Of Information Technology With Business: An Alternative And Complementary View, Fernando Paulo Belfo

Fernando Paulo Belfo

The Information Technology (IT) team knowledge of business strategy and the organization team knowledge of information technology are critical factors in the strategic business and IT alignment (BIA). These two factors have in common precisely the importance of "knowledge". The Information Technology team lack of knowledge about business and its strategy and vice-versa should be a major concern for the organization, since this knowledge strongly affects the possibility of an appropriate strategic alignment between business and the IT. It is significantly important to create an enabling environment for the growth of shared knowledge of the business area, encouraging professional IT …


An Introduction To Virus Scanners, Umakant Mishra Aug 2010

An Introduction To Virus Scanners, Umakant Mishra

Umakant Mishra

The main functions of an anti-virus program are, (i) Virus prevention and file protection, (ii) Virus scanning and detection, (iii) Removing virus from infected files, and (iv) Recovering damaged files and objects.

An anti-virus program employs various methods to detect and remove viruses. The two popular methods of detecting viruses are signature scanning and behavior monitoring. However each of these methods has its strengths and weaknesses.

As the detection gets more sophisticated so are the virus programmers. The virus programmers also try to go one step beyond the anti-virus mechanism and create intelligent viruses which pose more and more difficult …


An Introduction To Computer Viruses, Umakant Mishra Aug 2010

An Introduction To Computer Viruses, Umakant Mishra

Umakant Mishra

The computer virus is a problem to computer users at all levels including students, home users, corporate users, system administrators, corporate managers and even the anti-virus manufacturers. The viruses are written by people with malefic intentions to trouble the innocent users.

There are many types of viruses are boot sector viruses, file viruses, worms, Trojan horses, macro viruses etc. Each of these has many different variants. The older viruses were transmitting through floppies. Some older viruses like boot sector viruses are very rare nowadays as nobody boots from floppies. The modern day viruses transmit more through networks and emails. Macro …


Methods Of Virus Detection And Their Limitations, Umakant Mishra Aug 2010

Methods Of Virus Detection And Their Limitations, Umakant Mishra

Umakant Mishra

An anti-virus program typically employs various strategies to detect and remove viruses. The popular methods of detecting virus are signature scanning, heuristic scanning and integrity checking. However each of these methods has its own strengths and weaknesses.

Signature scanning (or searching of known virus patterns) is the most common method of virus detection. But it cannot detect viruses whose signatures are not available in the virus database. The other popular method is to use a heuristic algorithm to find viruses based on common behaviors. This method can be complex, but it has the ability to detect unknown or new viruses. …


Data Recovery 101, Neeraj Mukhi Jun 2010

Data Recovery 101, Neeraj Mukhi

Neeraj Mukhi

At some point in time, everyone who owns a computer will experience the trials and tribulations of hard drive failure. The reasons behind it vary, and could include everything from a human error to damages resulting from flood or water. Viruses can play a role as well, along with many other factors. For many years, the need to recover data that has been lost or destroyed has made data recovery such a very valuable asset.


Demonstrating Contradictions In A Graphical User Interface, Umakant Mishra Jun 2010

Demonstrating Contradictions In A Graphical User Interface, Umakant Mishra

Umakant Mishra

Designing a GUI is not so easy as it may appear to outside. The developer has to face many difficulties while improving the features of a GUI. In many cases improving one feature of a GUI results in worsening another feature of it, thus leading to a situation known as contradiction in TRIZ. Many such contradictions have been solved by different inventors in the past. We will demonstrate some important contradictions in this article and discuss alternative solutions for each contradiction.


A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo Mar 2010

A Novel Eight Switches Inverter Topology For Plug-In Hybrid Electric Vehicle, Omar Hegazy, Joeri Van Mierlo

Dr. Eng. Omar Hegazy

In this paper, a novel inverter topology, Eight Switches Inverter (ESI), is proposed for HEV, especially PHEV system to reduce the number of switches, and to achieve high performance during discharging mode, braking mode and charging mode from grid. Thereby, this topology gives the ability to connect the vehicle with grid at home or at work to charge the Energy Storage System (ESS) easily, especially the battery unit. In addition, the cost and the volume of the power electronics unit (PEU) have reduced. In this research, there are two control strategies have tested to validate the performance of the proposed …


Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana Mar 2010

Rwanda National Customer Satisfaction Survey: Results And Conclusions, Deogratias Harorimana

Dr Deogratias Harorimana

It can be said that development practice requires more than financial and manpower inputs. Rwanda, in 1994 suffered a Genocide. The Society,collectively and under the leadership of His Excellence Paul Kagame the current elected President of Rwanda came together and designed strategies that would propel Rwanda to a Middle-Income, Private Sector Led Economy by the Year 2020.

In 2009, a client seating in one of the Hotels in a Suburb of Remera, in Kigali City, complained about poor service delivery he was experiencing from the waitress staff.Using his Blackberry message, the client forwarded an email to some of the RDB …


Homotopy Perturbation Algorithm Using Laplace Transformation, Mohammad Madani, Mahdi Fathizade Mar 2010

Homotopy Perturbation Algorithm Using Laplace Transformation, Mohammad Madani, Mahdi Fathizade

Mohammad Madani

In this paper, a combinatory method of the Laplace transform and the homotopy perturbation method is proposed to solve non-homogeneous partial differential equations with variable coefficients. The obtained approximate solutions are compared with exact solutions and those obtained by other analytical methods, showing reliability of the present method.


Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana Jan 2010

Enterprise Development Policies And Capacity-Building In Science, Technology And Innovation (Sti)-Response To The Issue Note, Deogratias Harorimana

Dr Deogratias Harorimana

Enterprise Development, Investment and Business Climate are all important for economic growth. But what policies, strategies are needed to make economic growth a reality. The author has followed one of the World's fastest reformer and emerging nation in the Heart of Africa-Rwanda. The paper shares lessons and practical aspects related to building an entrepreneurial population, and building a government which is a facilitator of business climate


Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles Recchia, Shubhendu Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert Jan 2010

Explaining Cache Ser Anomaly Using Relative Due Avf Measurement, Arijit Biswas, Charles Recchia, Shubhendu Mukherjee, Vinod Ambrose, Leo Chan, Aamer Jaleel, Mike Plaster, Norbert Seifert

Charles H Recchia

No abstract provided.


Methanol Recovery During Transesterification Of Palm Oil In A Tio2/Al2o3 Membrane Reactor: Experimental Study And Neural Network Modeling, Abdul Aziz Abdul Raman Jan 2010

Methanol Recovery During Transesterification Of Palm Oil In A Tio2/Al2o3 Membrane Reactor: Experimental Study And Neural Network Modeling, Abdul Aziz Abdul Raman

Abdul Aziz Abdul Raman

High quality palm oil biodiesel can be produced by combination of alkali transesterification and separation processes in a TiO2/Al 2O3 membrane reactor. Due to the small molecular size, methanol molecules are able to pass through the membrane along with the products. Since methanol is one of the process reactants it is necessary to be recovered. Methanol recovery by means of continuous distillation was employed and the influences of different operational parameters including heating temperature permeate flow rate and reactants ratio were investigated. The results indicate that these parameters have significant effects on the rate of methanol recovery. To simulate the …


Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr Jan 2010

Survey Report On Training And Spending On Customer Care Services, Deogratias Harorimana Sr

Dr Deogratias Harorimana

In a bid to promote and develop good customer care service in various sectors of Rwandan economy, a survey was conducted to assess progress and trends on customer service capacity building. Although shortcomings are there, there have been efforts and registered trends across the country on service delivery front. Investment in Capacity Building IS happening in certain sectors but this is unevenly distributed. In 2008 companies had started recognizing the significance of good service and cultivate a good working environment and training. From 2009, there was a decline in investment in capacity building in front office and key service delivery …


Value Networks For Developing Mobile Innovations: The Case Of Apple Iphone, Mutaz M. Al-Debei Jan 2010

Value Networks For Developing Mobile Innovations: The Case Of Apple Iphone, Mutaz M. Al-Debei

Dr. Mutaz M. Al-Debei

This paper intuitively utilizes a methodical approach (i.e. VNM Model) to analyze the success of Apple iPhone mobile innovation from a value network perspective. The paper demonstrates, through the case of iPhone, how a powerful and well- designed value network is a critical enabler of innovations in the mobile telecommunications industry. Retrospectively, the paper also discusses key value drivers of successful value networks.


Developing A Unified Framework Of The Business Model Concept, Mutaz M. Al-Debei, David Avison Jan 2010

Developing A Unified Framework Of The Business Model Concept, Mutaz M. Al-Debei, David Avison

Dr. Mutaz M. Al-Debei

Recent rapid advances in Information and Communication Technologies (ICTs) have highlighted the rising importance of the Business Model (BM) concept in the field of Information Systems (IS). Despite agreement on its importance to an organization’s success, the concept is still fuzzy and vague, and there is little consensus regarding its compositional facets. Identifying the fundamental concepts, modeling principles, practical functions, and reach of the BM relevant to IS and other business concepts is by no means complete. This paper, following a comprehensive review of the literature, principally employs the content analysis method and utilizes a deductive reasoning approach to provide …


Developing A Decision-Making Framework For Web Service Security Profiles: A Design-Science Paradigm, Mutaz M. Al-Debei, Bachar Alrouh, Gheorghita Ghinea Jan 2010

Developing A Decision-Making Framework For Web Service Security Profiles: A Design-Science Paradigm, Mutaz M. Al-Debei, Bachar Alrouh, Gheorghita Ghinea

Dr. Mutaz M. Al-Debei

In this paper, we provide a novel analytical hierarchy process decision-making framework for Web service security profiles. This framework aids in solving the dilemma of which Web service security profile is most fitting in a particular situation. This is because the developed framework allows architects and developers to take informed decisions following a systematic and manageable approach. In developing the framework, we followed the design-science research paradigm within which we incorporated a number of laboratory experiments.


Engaging With Citizens Online: Understanding The Role Of Epetitioning In Local Government Democracy, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos Jan 2010

Engaging With Citizens Online: Understanding The Role Of Epetitioning In Local Government Democracy, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos

Dr. Mutaz M. Al-Debei

According to the Local Democracy, Economic Development and Construction Act introduced in 2009, UK local authorities are expected to implement ―a facility for making petitions in electronic form to the authority‖. Motivated by this arrangement, this paper reflects on the findings of a case study investigation conducted with the Royal Borough of Kingston (one of the first local authorities to implement such a service since 2004). Lessons learnt from the case suggest that ePetitions reveal increased potential to enhance local government democracy, but are also shaped by challenging open implementation issues which can highly influence the initiative’s impact. Our conclusions …


The Design And Engineering Of Mobile Data Services:Developing An Ontology Based On Business Model Thinking, Mutaz M. Al-Debei, Guy Fitzgerald Jan 2010

The Design And Engineering Of Mobile Data Services:Developing An Ontology Based On Business Model Thinking, Mutaz M. Al-Debei, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

This paper addresses the design and engineering problem related to mobile data services. The aim of the research is to inform and advise mobile service design and engineering by looking at this issue from a rigorous and holistic perspective. To this aim, this paper develops an ontology based on business model thinking. The developed ontology identifies four primary dimensions in designing business models of mobile data services: value proposition, value network, value architecture, and value finance. Within these dimensions, 15 key design concepts are identified along with their interrelationships and rules in the telecommunication service business model domain and unambiguous …


The Design Of Innovative Mobile Artifacts: How To Develop Powerful Value Networks?, Mutaz M. Al-Debei, Guy Fitzgerald Jan 2010

The Design Of Innovative Mobile Artifacts: How To Develop Powerful Value Networks?, Mutaz M. Al-Debei, Guy Fitzgerald

Dr. Mutaz M. Al-Debei

The development of mobile data services and products calls for participation and collaboration amongst many actors with different expertise. However, building powerful value network is challenging and requires a detailed examination of a number of design constructs and their interrelationships. This research provides an intuitive model to help effectively design such networks. The model is illustrated using NTT DoCoMo’s i-mode case. It is argued that the model offers a useful methodical approach for telecoms providers to develop a thriving value network capable of creating significant mobile innovations and benefits.


Rethinking The Business Model Concept With Eparticipation, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman Jan 2010

Rethinking The Business Model Concept With Eparticipation, Mutaz M. Al-Debei, Panagiotis Panagiotopoulos, Guy Fitzgerald, Tony Elliman

Dr. Mutaz M. Al-Debei

Enhancing citizen participation in policy making using Information and Communication Technologies (ICTs) is emerging as a strategic issue for political organisations. ICT-mediated participation, or eParticipation, projects range from the more traditional public sector initiatives, such as petitions and consultations, to attempts at integrating new forms of participatory Web 2.0 media. In this paper, we argue that the potential of ICTs to deliver sustainable eParticipation has not been fully achieved. This is mainly because of the lack of (1) effective coordination at the implementation level, (2) appropriate infrastructure, and (3) effective service design and development. In addressing this gap, we examine …


Economic Design Of Retaining Wall Using Particle Swarm Optimization With Passive Congregation, Mohammad Khajehzadeh, M R., Taha, A., El-Shafie, Mahdiyeh Eslami Jan 2010

Economic Design Of Retaining Wall Using Particle Swarm Optimization With Passive Congregation, Mohammad Khajehzadeh, M R., Taha, A., El-Shafie, Mahdiyeh Eslami

Dr. Mahdiyeh Eslami (مهدیه اسلامی)

No abstract provided.


Adaptive Pid Control Based On Rbf Network Approximating The Satellite Clock Thermal Model, Bin Xu Jan 2010

Adaptive Pid Control Based On Rbf Network Approximating The Satellite Clock Thermal Model, Bin Xu

Bin Xu

The accuracy o f t ime information prov ided by sate llite clock g reat ly depends on its frequency stab ili􀀁 ty, w hich is up to the stability o f the co re tempera ture. Th is paper introduces an adaptive PID control for the sate llite c lock system whose mode l is approx imated based on RBF neural netw orks. Simu lation resu lts demonstrate the va lid ity o f the proposed contro.l